Publications
Preprint
-
arXivBabylon: Reusing Bitcoin Mining to Enhance Proof-of-Stake Security
-
PreprintGoldfish: Peer selection using Matrix completion in unstructured P2P network
-
ePrintThemis: Fast, Strong Order-Fairness inByzantine Consensus
-
PreprintPlayer-Replaceability and Forensic Support are Two Sides of the Same (Crypto) Coin
2022
-
MobiHocOptimal Bootstrapping of PoW Blockchains under 99% Adversarial Mining PowerAccepted in ACM MobiHoc 2022
-
APKCOrder-Fair Consensus in the Permissionless SettingIn ACM on ASIA Public-Key Cryptography Workshop 2022Best Paper Award
-
CCSMinotaur: Multi-Resource Blockchain ConsensusIn ACM Conference on Computer and Communications Security 2022
-
NDSIDispersedLedger: High-Throughput Byzantine Consensus on Variable Bandwidth NetworksIn Symposium on Networked Systems Design and Implementation 2022 (NDSI 2022)
2021
-
CCSSecuring Parallel-chain Protocols under Variable Mining PowerIn ACM Conference on Computer and Communications Security 2021
-
CCSBFT Protocol ForensicsIn ACM Conference on Computer and Communications Security 2021Best Paper Award Runner-Up
2020
- CCSEverything is a Race and Nakamoto Always WinsIn ACM Conference on Computer and Communications Security 2020TIFSPolyShard: Coded Sharding Achieves Linearly Scaling Efficiency and Security SimultaneouslyIn IEEE Transactions on Information Forensics and Security 2020
2019
-
PODCCoded State Machine - Scaling State Machine Execution under Byzantine FaultsIn the Symposium on Principles of Distributed Computing 2019